Home

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 8.0.0 and below incorrectly handle the entropy keyword when not anchored to a "sticky" buffer, which can lead to a segmentation fault. This issue is fixed in version 8.0.1. To workaround this issue, users can disable rules using the entropy keyword, or validate they are anchored to a sticky buffer.

PUBLISHED Reserved 2025-09-09 | Published 2025-10-01 | Updated 2025-10-01 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-476: NULL Pointer Dereference

Product status

< 8.0.1
affected

References

github.com/...ricata/security/advisories/GHSA-5qf6-92xg-3rr3

github.com/...ommit/9f32550e18f97ea5d610dd7c36aab0ba142c096c

forum.suricata.io/t/suricata-8-0-1-and-7-0-12-released/6018

redmine.openinfosecfoundation.org/issues/7838

cve.org (CVE-2025-59148)

nvd.nist.gov (CVE-2025-59148)

Download JSON